SSH access to databases at DIMDI
|
|
- Miles Lyons
- 8 years ago
- Views:
Transcription
1 SSH access to databases at DIMDI From November 2013 we will be fulfilling the requirement of a large number of users for increased security during research activities. For this, we will be providing a better alternative to the Telnet access used up to now. This will allow you to access our data via SSH by way of an authenticated, encrypted connection. In contrast to Telnet, all network traffic is transmitted in an encrypted manner, including passwords. The DIMDI will stop all Telnet connections from the end January A prerequisite for using the SSH connection is that you inform us of your fixed IP address and your public key. We will enter this IP address (not possible for dynamic IP addresses) in our firewall. The public key will be entered into our system and allows your access. You may still have to enter our host name (grips.dimdi.de) on your side, in your firewall. A range of programs are available free of charge for access via SSH, for example PuTTY or Tera Term. An example is provided below of how you can set up your access using PuTTY. Host name configuration First, install the program. After invocation, the PuTTY configuration starts with the "Session" category for providing details about the target computer. Enter "grips.dimdi.de" under Host Name, and "55557" under Port. SSH access to DIMDI website page 1
2 Log file Select the subitem "Logging" (Options controlling session logging) to capture your research in a text file. Select "Printable output" and enter the path for your log file under "Log file name". To ensure that no log is lost, we recommend selecting the associated option "Always append to the end of it". In this manner, a file is updated and can always be cleared again once you have saved your results. Alternatively, you can enter a different file path in each instance. SSH access to DIMDI website page 2
3 Back key To perform corrections by means of the Back key ( ), select "Control-H" under "Terminal" - "Keyboard" (Options controlling the effects of keys). Window size Set your windows and buffer under "Window" (Options controlling PuTTY's window). For this, select a sufficient number of columns and rows (Columns and Rows) as well as scrollback lines (Lines of scrollback). SSH access to DIMDI website page 3
4 Font and background colour Use the menu option "Window Colours to change the foreground and background colours (Options controlling use of colours: Default Foreground and/or Default Background). This avoids having to work with a white font on a black background. You can set the exact colour by clicking on Modify. If you prefer to work with black font on white, select 0 or 255 for all RGB values. SSH access to DIMDI website page 4
5 Specifying login details Enter "gripsssh" under "Connections Data" (Data to send to the server) in the field "Auto-login username". Entering the key Your private key (rsa suffix) must be converted into the PuTTY format (ppk suffix). To do this, use the PUTTY Key Generator (puttygen.exe). Store this key on your PC. Now open additional subitems (click "+") under "Connection SSH" and select "Auth" (Options controlling SSH authentication). Enter the storage location for your key in the field "Private key file for identification". SSH access to DIMDI website page 5
6 Saving settings You can store these settings so that you do not have to re-enter them every time. For this, assign a name to the profile (menu "Session", store via "Save", see screenshot p. 1 ) in the field "Saved sessions". You can then select your profiles from here at a later stage via "Load". Establishing a connection Under "Session", you can connect with the DIMDI using the profile of your choice (click on "Open"). You will receive the usual message "Hello from DIMDI: Please enter Usercode:" Please note, that you cannot use the shortcuts Ctrl + C und Ctrl + V for copy and insert out of the clipboard. Simply by marking you can copy texts into the clipboard and insert contents by click with the right mouse button at this level. Cost calculation prior to logout Enter "STOP" to end your research, and to disconnect. As the window closes immediately, you will not be able to read the cost calculation. You can however find the information in your log file. You can call up the cost information via "INFO COST=SESSION before logging out. SSH access to DIMDI website page 6
Tera Term Telnet. Introduction
Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start
More informationInstall and configure SSH server
Copyright IBM Corporation 2009 All rights reserved Install and configure SSH server What this exercise is about... 1 What you should be able to do... 1 Introduction... 1 Part 1: Install and configure freesshd
More informationAnzioWin FTP Dialog. AnzioWin version 15.0 and later
AnzioWin FTP Dialog AnzioWin version 15.0 and later With AnzioWin version 15.0, we have included an enhanced interactive FTP dialog that operates similar to Windows Explorer. The FTP dialog, shown below,
More informationStep-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
More informationSETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.
SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. 1. Setting up your network to allow incoming connections on ports used by Eyemax system. Default ports used by Eyemax system are: range of ports 9091~9115
More informationConfiguring for SFTP March 2013
Configuring for SFTP March 2013 Overview You can upload files to and download files from Optimal Payments securely via SFTP. In order to be configured to upload and download files via SFTP, contact Technical
More informationRemote Desktop In OpenSUSE 10.3
Only for dummies Remote Desktop In OpenSUSE 10.3 Remote access to Linux GUI Environment from Windows Client Tedy Tirtawidjaja 5/14/2008 In Microsoft Windows environment we know Remote Desktop application
More informationF-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
More informationUploading files to a web server using SSH Secure Shell 3.2.9
Uploading files to a web server using SSH Secure Shell 3.2.9 Practical workbook Aims and Learning Objectives By the end of this course you will be able to: Upload your documents (for example HTML files)
More informationAccess to HZB internal computers via SSH tunnel with PuTTY (Screenshots Windows 7)
Access to HZB internal computers via SSH tunnel with PuTTY (Screenshots Windows 7) Many computers are not available to access from the outside. With a valid HZB account you may establish a tunnel to access
More informationUndergraduate Academic Affairs \ Student Affairs IT Services. VPN and Remote Desktop Access from a Windows 7 PC
Undergraduate Academic Affairs \ Student Affairs IT Services VPN and Remote Desktop Access from a Windows 7 PC Last edited: 4 December 2015 Contents Inform IT Staff... 1 Things to Note... 1 Setting Up
More informationThe FlexiSchools Online Order Management System Installation Guide
The FlexiSchools Online Order Management System Installation Guide FlexiSchools May 2012 Page 1 of 16 Installation Pack Welcome to the FlexiSchools system. You will have received a disc containing: Sato
More informationCampus VPN. Version 1.0 September 22, 2008
Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several
More informationSecure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
More informationHow to Tunnel Remote Desktop Through SSH on a Windows Computer
College of Engineering > Computing Resources > Computing Best Practices > W indows Remote Desktop How to Tunnel Remote Desktop Through SSH on a Windows Computer Why me and why now? CAE has been charged
More informationCONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server
More informationStep-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited. 1
More informationPandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide
Pandora FMS 3.0 Quick User's Guide April 27th, 2009 1 Contents How to monitor a network computer/device?...3 Concepts...3 What's an agent?...3 What's a module?...3 Data transfer modes...3 What is an alert?...3
More informationDynamic DNS How-To Guide
Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol
More informationHow to Install a Network-Licensed Version of IBM SPSS Statistics 19
How to Install a Network-Licensed Version of IBM SPSS Statistics 19 Important: IBM SPSS Statistics 19 requires either Windows XP Professional or later. IBM SPSS Statistics 19 installs from a DVD and your
More informationStep-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Network Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
More informationTELNET CLIENT 5.11 SSH SUPPORT
TELNET CLIENT 5.11 SSH SUPPORT This document provides information on the SSH support available in Telnet Client 5.11 This document describes how to install and configure SSH support in Wavelink Telnet
More informationMobileStatus Server Installation and Configuration Guide
MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,
More informationHow to Connect to Anonyproz OpenVPN Servers in Failover and Switcher Modes
How to Connect to Anonyproz OpenVPN Servers in Failover and Switcher Modes Anonyproz provides a powerful and feature-packed customized open source OpenVPN GUI client. The latest GUI offers our subscribers
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationThe FlexiSchools Online Order Management System Installation Guide
The FlexiSchools Online Order Management System Installation Guide Installation Pack Welcome to the FlexiSchools system. You will have received a disc containing: Zebra Drivers FlexiSchools Online Order
More informationPage 1 of 11. Setting up VPN on Windows XP. Setting up VPN on Windows XP version 1.2
Page 1 of 11 Setting up VPN on Windows XP Page 2 of 11 Setting up VPN on Windows XP(Professional) Requirements: 1. These instructions are only applicable for a computer that has Windows XP Professional
More informationfor Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
More informationUsing SSH Secure Shell Client for FTP
Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking
More information2010 Ing. Punzenberger COPA-DATA GmbH. All rights reserved.
2010 Ing. Punzenberger COPA-DATA GmbH All rights reserved. Distribution and/or reproduction of this document or parts thereof in any form are permitted solely with the written permission of the company
More informationStep-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
More informationThe FlexiSchools Online Order Management System Installation Guide
The FlexiSchools Online Order Management System Installation Guide FlexiSchools May 2012 Page 1 of 18 Installation Pack Welcome to the FlexiSchools system. You will have received a disc containing: Sato
More informationAT&T Global Network Client v6.8.0 and Passport IP Setup Instructions for Broadband VPN Access
AT&T Global Network Client v6.8.0 and Passport IP Setup Instructions for Broadband VPN Access October 19, 2006 1 Installing AT&T GNC 6.8.0 for Broadband VPN Access... 3 Getting Started... 3 License Agreement...
More informationShadowControl ShadowStream
ShadowControl ShadowStream Revision 1.3 4/12/2012 Table of Contents Introduction... 3 Download ShadowStream Server... 3 Installation... 4 Configuration... 5 Creating Users... 6 Testing the User Rights...
More informationConnecting an Android to a FortiGate with SSL VPN
Connecting an Android to a FortiGate with SSL VPN This recipe describes how to provide a group of remote Android users with secure, encrypted access to the network using FortiClient and SSL VPN. You must
More informationConfiguration Guide. Remote Backups How-To Guide. Overview
Configuration Guide Remote Backups How-To Guide Overview Remote Backups allow you to back-up your data from 1) a ShareCenter TM to either a Remote ShareCenter or Linux Server and 2) Remote ShareCenter
More informationSetting Up Sharp MX-Color Imagers To Scan To Email
Setting Up Sharp MX-Color Imagers To Scan To Email MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, MX-M850, MX-M950, MX-M1100 Step 1. Click Start > Run
More information1. Open the preferences screen by opening the Mail menu and selecting Preferences...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
More informationSGUL VPN Connection Guide for Windows 10
SGUL VPN Connection Guide for Windows 10 2016-01-22 First draft 2016-01-29 Second draft 2016-04-01 First release v1.0 Regulations Before connecting to the network, you should familiarize yourself with
More informationJava Remote Desktop. Java Remote Desktop. The Manual of Java Remote Desktop 1.12. J3PSoftware Revision 2.0 1
Java Remote Desktop The Manual of Java Remote Desktop 1.12 J3PSoftware Revision 2.0 1 1.I About Java Remote Desktop 1.II About this manual 2 Java Remote Desktop Versions 2.1 Java Remote Desktop 2.2 Java
More informationTR-7W Configuration Guide. Before You Start
TR-7W Configuration Guide Before You Start Take a few moments before you start to make the following simple checks. A few moments spent before you start installing your system can save a lot of time later
More informationfreesshd SFTP Server on Windows
freesshd SFTP Server on Windows Configuration Steps: Setting up the Bridgestone User ID... 2 Setup the freesshd Server... 3 Login as the Bridgestone User ID using WinSCP... 5 Create Default Bridgestone
More informationAlienVault. Unified Security Management 5.x Configuring a VPN Environment
AlienVault Unified Security Management 5.x Configuring a VPN Environment USM 5.x Configuring a VPN Environment, rev. 3 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
More informationUsing WebVPN (webvpn.childrens.harvard.edu) to access shared and P drives, access e-mail, and use Remote Desktop
Using WebVPN (webvpn.childrens.harvard.edu) to access shared and P drives, access e-mail, and use Remote Desktop Connecting to your shared drive To connect to your shared drive, you must bookmark it. When
More informationIf you prefer to use your own SSH client, configure NG Admin with the path to the executable:
How to Configure SSH Each Barracuda NG Firewall system is routinely equipped with an SSH daemon listening on TCP port 22 on all administrative IP addresses (the primary box IP address and all other IP
More informationHallpass Instructions for Connecting to Mac with a Mac
Hallpass Instructions for Connecting to Mac with a Mac The following instructions explain how to enable screen sharing with your Macintosh computer using another Macintosh computer. Note: You must leave
More informationOutlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on. User Information
Outlook Express Open up Outlook Express From the Menu Bar Tools to Accounts - Click on Mail Tab Click on mail.btconline.net mail (default) Click on Properties button Click on the General tab User Information
More informationF-Secure. Securing the Mobile Distributed Enterprise. F-Secure SSH User's and Administrator's Guide
F-Secure Securing the Mobile Distributed Enterprise F-Secure SSH User's and Administrator's Guide F-Secure SSH for Windows, Macintosh, and UNIX Secure Remote Login and System Administration User s & Administrator
More informationThe FlexiSchools Online Order Management (FOOM) Installation Guide
The FlexiSchools Online Order Management (FOOM) Installation Guide Installation Pack Welcome to the FlexiSchools system. You will have been sent an email and two packages delivered by courier, one with
More informationSetting Up VPN Connection to use Internet Access. 2. Right click on the appropriate VPN connection and click properties
Setting Up VPN Connection to use Internet Access 1. Right click on My Network Places and click on Properties 2. Right click on the appropriate VPN connection and click properties 3. Click on the Networking
More informationNetwork Load Balancing
Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account
More informationSecurepoint Security Systems
HowTo: VPN with OpenVPN, certificates and OpenVPN-GUI Securepoint Security Systems Version 2007nx Release 3 Contents 1 Configuration on the appliance... 4 1.1 Setting up network objects... 4 1.2 Creating
More informationInstalling the SSH Client v3.2.2 For Microsoft Windows
WIN1011 June 2003 Installing the SSH Client v3.2.2 For Microsoft Windows OVERVIEW... 1 SYSTEM REQUIREMENTS... 2 INSTALLING THE SSH PACKAGE... 2 STARTING THE PROGRAMS... 5 USING THE SHELL CLIENT... 8 USING
More informationSecure Shell. The Protocol
Usually referred to as ssh The name is used for both the program and the protocol ssh is an extremely versatile network program data encryption and compression terminal access to remote host file transfer
More informationConfiguring the WT-4 for ftp (Ad-hoc Mode)
En Configuring the WT-4 for ftp (Ad-hoc Mode) Mac OS X Introduction This document provides basic instructions on configuring the WT-4 wireless transmitter and a Mac OS X (10.5.2) ftp server for transmission
More informationInteracting with Users
7 Interacting with Users 7 Apple Remote Desktop is a powerful tool for interacting with computer users across a network. You can interact by controlling or observing remote screens, text messaging with
More informationRTCU Gateway 2 Monitor Tool User's Manual
RTCU Gateway 2 Monitor Tool User's Manual Version 3.20 I RTCU Gateway 2 - Monitor Tool Table of Contents Part I Monitor Tool 2 1 Clients... 3 2 Message... Log 4 3 Main... Menu 4 File... 5 Connect... 5
More informationUse the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.
Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. 1. Click the Windows Start button, then Control Panel How-To-WCC-Secure-Windows-7-11/4/2010-4:09
More informationfor Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
More informationInternet Access to a DVR365
Configuration Details : Internet Access to DVR365 Page : 1 Internet Access to a DVR365 These instructions will show you how to connect your DVR365 to the internet via an ADSL broadband modem/router. The
More informationThis means that any user from the testing domain can now logon to Cognos 8 (and therefore Controller 8 etc.).
ChaseReferrals and multidomaintrees Graphical explanation of the difference Imagine your Active Directory network looked as follows: Then imagine that you have installed your Controller report server inside
More informationUser Manual. COBA Server Manager ID UM.L82342.2012
ID UM.L82342.2012 User Manual User Manual 2 (15) Index 4 1. General Information... 5 2. Users & Permissions... 8 2.1 Users... 8 2.2 Roles...10 2.3 Permissions...12 2.4 Quick Create Users...13 3. Services...14
More informationInstallation Troubleshooting Guide
Installation Troubleshooting Guide Firebird Database Connection Errors DBA Next Generation uses the Firebird Database server for connections to the database. If you have a connection error when launching
More informationTechnical Note. Monitoring Ethernet Traffic with Tolomatic ACS & Managed Switch. Contents
Monitoring Ethernet Traffic with Tolomatic ACS & Managed Switch Contents 1. Introduction...2 2. Equipment...2 3. Software...3 4. Definitions...3 5. Procedure...3 6. Change PC IP Address...3 7. Network
More informationHow to Configure Active Directory based User Authentication
How to Configure Active Directory based User Authentication You Must Have: Microsoft server with Active Directory configured. Windows 2000 Server is configured as Active Directory server in this example.
More informationAlcatel-Lucent Extended Communication Server Active directory synchronization : installation and administration
Alcatel-Lucent Extended Communication Server Active directory synchronization : installation and administration September, 2009 TC1312 Alcatel-Lucent Office Offer - All Rights Reserved Alcatel-Lucent 2009
More informationSSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software
More informationRemote Access to Unix Machines
Remote Access to Unix Machines Alvin R. Lebeck Department of Computer Science Department of Electrical and Computer Engineering Duke University Overview We are using OIT Linux machines for some homework
More informationOpenVPN over SSH tunneling
Step 1: What you'll need before starting OpenVPN over SSH tunneling You're going to need a couple of things in order to create an SSH tunnel that you can use as a SOCKS 5 proxy for tunneling OpenVPN or
More informationWEBSERVER OPERATION MANUAL
WEBSERVER OPERATION MANUAL CONTENTS 3 1 BASICS Introduction to Webserver 4-8 2 INSTALLATION/UNISTALLATION OF COMPONENTS Uninstalling the Internet Information Service (IIS) Installing the Webserver Installation
More informationChapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
More informationInstallation and Connection Guide to the simulation environment GLOBAL VISION
Installation and Connection Guide to the simulation environment GLOBAL VISION Hardware and Software Requirements The following hardware specification is recommended for client machines: 2 GHz Pentium class
More informationSetting up SMTP in Talis Decisions
Decisions Talis Library Management Suite Setting up SMTP in Talis Decisions This document describes how to configure SMTP (Single Mail Transfer Protocol) in Talis Decisions. It is intended for system administrators
More informationVirtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production
Virtual Owl Guide for Windows University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology Services
More informationMycobacterium Tuberculosis Database Management Software (MycoTB) User Manual
INSTITUTE OF MICROBIAL TECHNOLOGY BIOINFORMATICS CENTRE DR. G.P.S RAGHAVA LAB www.imtech.res.in/raghava/ Mycobacterium Tuberculosis Database Management Software (MycoTB) User Manual Dr. G.P.S Raghava and
More informationOutlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.
Outlook Express Open up Outlook Express From the Menu Bar Tools to Accounts - Click on Mail Tab Click on mail.nefcom.net (default) Click on Properties button Click on the General tab User Information E-mail
More informationHow to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P)
How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P) Scenario # 1: Single Node or Standalone SA... 2 Scenario
More informationManaged Devices - Web Browser/HiView
Managed Devices - Web Browser/HiView All Hirschmann managed devices have a web based GUI interface available for configuration purposes. This is typically the primary means of configuration used for most
More informationNetwork Projector Operation Guide
Network Projector Operation Guide Table of contents Preparation...3 Connecting the projector with your computer...3 Wired connection... 3 Wireless connection (for selective models)... 4 QPresenter...7
More information2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer
Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session
More informationUW Computer Science and Engineering Starting UNIX X Clients From Windows XP. revised September 2008 - Warren Jessop
UW Computer Science and Engineering Starting UNIX X Clients From Windows XP revised September 2008 - Warren Jessop X Clients on Windows PCs 1 Prerequisites You ll need a PC running XP or Vista. The Goal
More informationGFI FAXmaker 14 for Exchange/Lotus/SMTP. Fax-Client Manual. By GFI Software Ltd
GFI FAXmaker 14 for Exchange/Lotus/SMTP Fax-Client Manual By GFI Software Ltd http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names,
More informationHOW TO CONNECT TO FTP.TARGETANALYSIS.COM USING FILEZILLA. Installation
HOW TO CONNECT TO FTP.TARGETANALYSIS.COM USING FILEZILLA Note: These instructions direct you to download a free secure FTP client called FileZilla. If you already use a secure client such as WS-FTP Pro
More informationCreating an ESS instance on the Amazon Cloud
Creating an ESS instance on the Amazon Cloud Copyright 2014-2015, R. James Holton, All rights reserved (11/13/2015) Introduction The purpose of this guide is to provide guidance on creating an Expense
More informationMultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
More informationHowTo: Logging, reporting, log-analysis and log server setup Version 2007nx Release 3. Log server version 2.0
Log server version 2.0 Contents 1 Setting up the log server for the appliance... 4 1.1 Registering the log server on the appliance... 4 1.2 Entering the Syslog server to the appliance... 6 2 Log server...
More informationREQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series
More informationPcounter Web Administrator User Guide - v2014-09-08. Pcounter Web Administrator User Guide Version 1.0
Pcounter Web Administrator User Guide - v2014-09-08 Pcounter Web Administrator User Guide Version 1.0 Table of Contents Table of Contents... 2 Overview... 3 Installation Prerequisites and Requirements...
More informationUser guide. Business Email
User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook
More informationPort Forwarding your Router for Use with a Network DVR
Copyright 2007 SVAT Electronics Port Forwarding your Router for Use with a Network DVR Table of Contents Page 2: Belkin Router Page 3: D-Link Wireless Router Page 4: Linksys Wireless Router Page 5: Linksys
More informationRSA SecurID Token User Guide February 12, 2015
RSA SecurID Token User Guide Page i Table of Contents Section I How to request an RSA SecurID token... 1 Section II Setting your RSA SecurID PIN... 6 Section III Setting up PuTTY on your Windows workstation
More informationWinSCP for Windows: Using SFTP to upload files to a server
WinSCP for Windows: Using SFTP to upload files to a server Quickstart guide Developed by: Academic Technology Services & User Support, CIT atc.cit.cornell.edu Last updated 9/9/08 WinSCP 4.1.6 Getting started
More informationSENDING EMAILS & MESSAGES TO GROUPS
SENDING EMAILS & MESSAGES TO GROUPS Table of Contents What is the Difference between Emails and Selltis Messaging?... 3 Configuring your Email Settings... 4 Sending Emails to Groups Option A: Tasks...
More informationIntegrating Trend Micro OfficeScan 10 EventTracker v7.x
Integrating Trend Micro OfficeScan 10 EventTracker v7.x Publication Date: August 26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help you in
More informationPT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1
More informationUsing SQL-server as database engine
This tutorial explains on a step by step base how to configure YDOC-Insights for usage with a SQL-server database. (How to manage SQL-server itself is not part of this tutorial) CONTENTS CONTENTS 1 1.
More informationFileMover 1.2. Copyright Notice. Trademarks. Patents
FileMover 1.2 Copyright Notice No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any human or computer language, in any form or by
More informationNote: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.
Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.
More informationHP Device Manager 4.6
Technical white paper HP Device Manager 4.6 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Configuring User Authentication...
More informationPaperCut NG Monitor Module Quick Start Guide
PAPERCUT SOFTWARE PTY LTD PaperCut NG Monitor Module Quick Start Guide Introduction The PaperCut NG Monitor Module (PC-MM) allows PaperCut NG to integrate with the Monitor Supervisor system to retrieve
More information